<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-06T10:56:45.095679+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/a43b51bd-a7d0-4f5e-8146-7f5a9089b765/export</id>
    <title>a43b51bd-a7d0-4f5e-8146-7f5a9089b765</title>
    <updated>2026-05-06T10:56:45.464305+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "a43b51bd-a7d0-4f5e-8146-7f5a9089b765", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-25575", "type": "seen", "source": "https://t.me/cibsecurity/39522", "content": "\u203c CVE-2022-25575 \u203c\n\nMultiple cross-site scripting (XSS) vulnerabilities in Parking Management System v1.0 allows attackers to execute arbitrary web scripts or HTML via crafted payloads injected into the user name, password, and verification code text boxes.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-25T01:30:01.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/a43b51bd-a7d0-4f5e-8146-7f5a9089b765/export"/>
    <published>2022-03-25T01:30:01+00:00</published>
  </entry>
</feed>
